Share files simply and securely in the cloud – Partner offering from Covata and T-Systems

  • End-to-end encryption ensures security
  • Highly available and easy to use with an app and browser
  • Australian security expert is new cloud partner

Lists of customers, contract details, price calculations – employees need secure and quick access to this kind of sensitive data. T-Systems and Australian data security specialist Covata are now offering a solution to this problem, from the cloud. The service is as simple to use as other file sharing offerings, but is based on enterprise grade security architecture and runs in a high-security data center operated by T-Systems in Germany. The Australian government, including the Australian Taxation Office, uses Covata to securely share information.

Speed and high availability of central company data are critical for companies to remain competitive. All too often, employees use freeware to exchange data, since it is an easy to access solution. However, a survey by Sky Dox revealed that more than half of the users using unapproved applications do not inform their IT department. As a result, security issues remain unresolved, with employees possibly violating IT compliance rules. The partnership between Covata and T Systems now offers CIOs a service that meets the needs for ease of use, high security and availability, while fulfilling compliance rules making it the best alternative to free offerings. Covata combines three core components for secure data management: Identity protection, real-time control of data and encryption. The software hosted on the T Systems cloud operates from a German data center, allowing businesses to remain compliant with strict German guidelines for data privacy and data security, while T-Systems looks after customer relationship management, providing support for users who have questions.

Using Covata Safe Share, files of any size can be shared inside and outside of the business by app or using a browser. File transport is encrypted end to end, with encryption taking place directly on the user device or in the browser. The keys and data are stored separately and each key only works once per file. Owners of a file can restrict access to it to specific groups of people, permit read-only access or limit the time it is available, providing businesses with ultimate control over their data.

Customers obtain the service from the cloud or directly in their data centers. Covata is ideal for around 500 users and above. There is no upper limit to the number of users. It can be linked with existing platforms such as SharePoint quickly and easily. The solution is available in German and English; other language versions can be made available quickly if needed.

The Telekom cloud – versatile, easy, secure
Since 2005, Deutsche Telekom and its subsidiary T Systems have offered secure end-to-end cloud solutions for companies of all sizes – from consulting to implementation, billing and customer service through to maintenance. Telekom's growing partner ecosystem includes solutions from SAP, Microsoft, Cisco, Salesforce, VMWare, Huawei, Oracle, SugarCRM and Informatica, and others.

About T-Systems
Deutsche Telekom considers the European business customer segment a strategic growth area. It offers small, medium-sized and multinational companies ICT solutions for an increasingly complex digital world. In addition to services from the cloud, the range of services centers around M2M, security solutions, complementary mobile communications and fixed-network products, and solutions for virtual collaboration and IT platforms, all of which form the basis for our customers' digital business models. The corporate customers unit (T-Systems) and its 47,800 employees around the world generated revenue of around EUR 8.6 billion in the 2014 financial year.

About Covata
Covata enables true ownership and control over your data in the cloud and over mobile services. We deliver data-centric security solutions without compromising simple usability; providing true end-to-end security. Your data is always protected wherever it may travel – inside your network, beyond the domain, to mobile devices and to the cloud – with granular access controls that extend to external ad hoc users, view-only restrictions, real time revocation and complete visibility and auditability. Own Your Data, control your data and choose where it is stored – with complete assurance that it is protected and secure. For further information please visit